×

Identities correlation infrastructure for passive network monitoring

  • US 8,584,195 B2
  • Filed: 09/12/2007
  • Issued: 11/12/2013
  • Est. Priority Date: 11/08/2006
  • Status: Active Grant
First Claim
Patent Images

1. An identity enabled policy monitoring system, comprising:

  • a network monitor device for receiving network traffic from a network under observation;

    an Identity Acquisition Manager (IAM), executing on a hardware processor communicatively connected to said network monitor, enabling said network monitor to perform a correlation analysis of user identities and said network traffic to infer which users and user groups are responsible for generating said network traffic and enabling said network monitor to store an Internet Protocol (IP) address of the network traffic in a cache of IP addresses when the correlation analysis performed at the network monitor indicates that there is no identity associated with the IP address, the IAM further configured to determine current login information, the current login information determined from login events and synthesized logout information, the synthesized logout information derived using a combination of timeouts and remote probing information, wherein the IAM distributes the current login information to one or more remote network monitors, wherein the remote probing is performed over the network, and wherein probing techniques include both identity aware and non-identity aware techniques, the identity aware techniques accessing an identity infrastructure associated with a device being probed to determine which users are currently logged into the device being probed, and the non-identity aware techniques analyzing network traffic indicated to have no identity associated with the IP address;

    an identity-enhanced policy having a priority ranking system for relationships based upon identities, said ranking based upon any of user identity, authenticated computer identity, group identity, and IP address; and

    a mechanism for connecting actively into the identity infrastructure of the network under observation to get information regarding identities and for passing said information regarding identities back to the IAM;

    wherein an identity-enhanced view of traffic is compared against a formal specification in said identity-enhanced policy; and

    wherein a human-readable report is generated indicating which traffic met and did not meet said identity-enhanced policy.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×